Disrupting Dark Networks

Nonfiction, Social & Cultural Studies, Social Science, Crimes & Criminals, Criminology, Political Science
Cover of the book Disrupting Dark Networks by Sean F. Everton, Cambridge University Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Sean F. Everton ISBN: 9781139794084
Publisher: Cambridge University Press Publication: November 12, 2012
Imprint: Cambridge University Press Language: English
Author: Sean F. Everton
ISBN: 9781139794084
Publisher: Cambridge University Press
Publication: November 12, 2012
Imprint: Cambridge University Press
Language: English

Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Disrupting Dark Networks focuses on how social network analysis can be used to craft strategies to track, destabilize and disrupt covert and illegal networks. The book begins with an overview of the key terms and assumptions of social network analysis and various counterinsurgency strategies. The next several chapters introduce readers to algorithms and metrics commonly used by social network analysts. They provide worked examples from four different social network analysis software packages (UCINET, NetDraw, Pajek and ORA) using standard network data sets as well as data from an actual terrorist network that serves as a running example throughout the book. The book concludes by considering the ethics of and various ways that social network analysis can inform counterinsurgency strategizing. By contextualizing these methods in a larger counterinsurgency framework, this book offers scholars and analysts an array of approaches for disrupting dark networks.

More books from Cambridge University Press

Cover of the book Love's Labour's Lost by Sean F. Everton
Cover of the book Intelligence Power in Peace and War by Sean F. Everton
Cover of the book The Politics of Shale Gas in Eastern Europe by Sean F. Everton
Cover of the book An Economic History of Nineteenth-Century Europe by Sean F. Everton
Cover of the book The Science and Practice of Landscape Stewardship by Sean F. Everton
Cover of the book Socio-Economic Development by Sean F. Everton
Cover of the book International Business Strategy by Sean F. Everton
Cover of the book The Biomarker Guide: Volume 1, Biomarkers and Isotopes in the Environment and Human History by Sean F. Everton
Cover of the book Multivariate Analysis of Ecological Data using CANOCO 5 by Sean F. Everton
Cover of the book European Criminal Law by Sean F. Everton
Cover of the book Introduction to Computational Genomics by Sean F. Everton
Cover of the book The Cambridge Companion to Husserl by Sean F. Everton
Cover of the book Hizbullah and the Politics of Remembrance by Sean F. Everton
Cover of the book The Cambridge Companion to Wyndham Lewis by Sean F. Everton
Cover of the book Samuel Johnson, the Ossian Fraud, and the Celtic Revival in Great Britain and Ireland by Sean F. Everton
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy